全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

A Novel LSB Steganography Technique for Enhancing Cloud Security

DOI: 10.4236/jis.2024.153021, PP. 355-377

Keywords: Steganography, LSB, Cloud Computing, Security, Cryptography, TLEA, MLEA

Full-Text   Cite this paper   Add to My Lib

Abstract:

Steganography is a technique that is frequently used to hide hidden information in multimedia artifacts including music, video, and images. In order to protect data saved in the cloud, this paper presents a steganography method for encrypting sound utilizing LSB-based computation. By using the least significant bit (LSB) of a byte to represent a message and then substituting each LSB bit with a binary message and encrypting a significant quantity of data. The proposed system uses the LSB technique of picture steganography, Multi-Level Encryption Algorithm (MLEA) and Two-Level Encryption Algorithm (TLEA) data encryption to give the highest level of cloud security. Compared to other current schemes, the performance of the suggested method is 1.732125% better on average.

References

[1]  Alam, K., Nushrat, S., Patwary, A.H., Ullah, A. and Robin, K.H. (2022) An Improved Approach of Image Steganography Based on Least Significant Bit Technique for Secure Communication in Cloud. Proceedings of the Second International Conference on Advanced Network Technologies and Intelligent Computing, Varanasi, 22-24 December 2022, 215-233.
https://doi.org/10.1007/978-3-031-28180-8_15
[2]  Hossain, S., Islam, S., Ullah, A. and Hossain, A. (2022) Design and Development of a Hybrid Intrusion Detection and Prevention System for Cloud Computing and Internet of Things Environment. Recent Innovations in Wireless Network Security, 4, 1-9.
https://zenodo.org/records/6796201
[3]  Apar, N.M., Munna, M.I., Ullah, A. and Rahman, H. (2022) Design and Development of a Dynamic Hashing Algorithm. International Journal of Scientific Research in Computer Science and Engineering, 10, 8-14.
https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2690
[4]  Hossain, M.A., Ullah, A., Hossain, S., Begum, S. and Ibrahim. (2021) Design and Development of a Novel Symmetric Algorithm for Enhancing Information Security. International Journal of Communication and Information Technology, 2, 49-60.
https://doi.org/10.33545/2707661X.2021.v2.i1a.40
[5]  Hossain, M., Ullah, A., Khan, N. and Alam, M. (2019) Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing. Journal of Information Security, 10, 199-236.
https://doi.org/10.4236/jis.2019.104012
[6]  Ficco, M., Tasquier, L. and Aversa, R. (2013) Intrusion Detection in Cloud Computing. Proceedings of the 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Compiegne, 28-30 October 2013, 276-283.
https://doi.org/10.1109/3PGCIC.2013.47
[7]  Moyou Metcheka, L. and Ndoundam, R. (2020) Distributed Data Hiding in Multi-Cloud Storage Environment. Journal of Cloud Computing, 9, Article No. 38.
https://doi.org/10.1186/s13677-020-00208-4
[8]  Awadh, W.A. and Hashim, A.S. (2017) Using Steganography for Secure Data Storage in Cloud Computing. International Research Journal of Engineering and Technology (IRJET), 4, 3668-3672.
https://www.irjet.net/archives/V4/i4/IRJET-V4I4885.pdf
[9]  Ranjan, A. and Bhonsle, M. (2016) Advanced Technics to Shared & Protect Cloud Data Using Multilayer Steganography and Cryptography. Proceedings of the 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), Pune, 9-10 September 2016, 35-41.
https://doi.org/10.1109/ICACDOT.2016.7877547
[10]  Kumar, K. (2017) Intrusion Detection and Prevention System in Enhancing Security of Cloud Environment. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 6, 1138-1152.
https://www.researchgate.net/publication/320331566_Intrusion_Detection_and_Prevention_System_in_enhancing_Security_of_Cloud_Environment
[11]  Sarker, M.K. and Chatterjee, T. (2014) Enhancing Data Storage Security in Cloud Computing through Steganography.
https://www.researchgate.net/publication/315850425_Enhancing_Data_Storage_Security_in_Cloud_Computing_Through_Steganography
[12]  Khan, M.A. (2021) Information Security for Cloud Using Image Steganography. Lahore Garrison University Research Journal of Computer Science and Information Technology, 5, 9-14.
https://doi.org/10.54692/lgurjcsit.2021.0501171
[13]  Abbas, M.S., Mahdi, S.S. and Hussien, S.A. (2020) Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography. Proceedings of the 2020 International Conference on Computer Science and Software Engineering (CSASE), Duhok, 16-18 April 2020, 123-127.
https://doi.org/10.1109/CSASE48920.2020.9142072
[14]  Ahmed, O.M. and Abduallah, W.M. (2017) A Review on Recent Steganography Techniques in Cloud Computing. Academic Journal of Nawroz University, 6, 106-111.
https://doi.org/10.25007/ajnu.v6n3a91
[15]  Pant, V.K., Prakash, J. and Asthana, A. (2015) Three Step Data Security Model for Cloud Computing Based on RSA and Steganography. Proceedings of the 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), Greater Noida, 8-10 October 2015, 490-494.
https://doi.org/10.1109/ICGCIoT.2015.7380514

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413